Technologies

Deep relationships. A diverse portfolio. Tangible results

We work with leading and visionary vendors across our three domains of excellence: Mobility, Cloud Security and Security Intelligence. We then invest in building powerful and deep relationships which include certification and becoming masters in the ecosystem.

We are uniquely positioned to understand how these market leading technologies work together and how they combine to deliver exceptional results. In many cases, Bridgeway’s strategy, project management, deployment and support capability are considered the de facto standard and recommended by our partners.

By working with the world’s most visionary vendors, we always have access to the technology which can best Deliver your chosen security and risk posture

Want to find out how IronWorks can help you prove and maintain the success of your mobility project?

The world’s leading security technologies

Bridgeway is here to help you choose the best-fitting solution.

Call us now on 01223 979 090

Accellion provide mobile solutions to enterprise organisations enabling increased business productivity while ensuring security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them.

Accellion provide mobile solutions to enterprise organisations enabling increased business productivity while ensuring security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them.

kiteworks is Accellion's next generation secure mobile file sharing and collaboration platform. kiteworks provides organisations with an intuitive, re-imagined user interface that empowers users to seamlessly access, share, and manage content across devices with a streamlined and consistent experience across mobile, web, and desktop.

kiteworks connects to existing content systems to provide a single user interface for mobile access to enterprise content, and enables secure external sharing while always maintaining integrity of the document of record.

Designed with unparalleled flexibility and scalability, Accellion provides organisations with less than 100 users to more than 100,000 users with flexible deployment options. Implementations can grow from a single office to a global distributed deployment.

kiteworks represents the leading private cloud platform optimised for security and control, which enforces data sovereignty for global deployments, and provides extreme scalability and agility via a three-tiered architecture. Accellion supports deployment in a private on premise, private hosted, or hybrid cloud; or FIPS 140-2 certified environment. All Accellion deployment options can be mixed and matched in a multi-site installation or installed as a standalone single site solution.

Eighty percent of Accellion customers choose to deploy the solution in a private cloud for increased data security and protection, often required by corporate and government organisations. With Accellion solutions, organisations can provide their users with secure anytime, anywhere access to enterprise information while protecting confidential information, ensuring compliance, improving employee productivity and reducing IT support.

Cisco Cloud Web Security provides industry-leading security and control for the distributed enterprise. Users are protected everywhere, all the time when using CWS through Cisco worldwide threat intelligence, advanced threat defence capabilities, and roaming user protection.

Cisco Cloud Web Security (CWS) provides industry-leading security and control for the distributed enterprise. Users are protected everywhere, all the time when using CWS through Cisco worldwide threat intelligence, advanced threat defence capabilities, and roaming user protection.

Advance Malware Protection – Get continuous visibility and control to defeat malware across the extended network and the full attack continuum—before, during, and after an attack.

Dropbox for Business lets your team bring work anywhere, syncing their important files across all their devices.

Dropbox for Business lets your team bring work anywhere, syncing their important files across all their devices. Powerful administration tools help you stay on top of your account and take control of your organisation’s information. Shared folders and links help keep everyone up to date, effortlessly. With Dropbox, team members can work together like they’re sitting right next to each other — even when they’re halfway around the world.

Manage your team

Get up and running: Seamlessly upgrade existing Dropbox accounts to Dropbox for Business, and transfer files to co-workers when people leave.

Centralise administration: Let your team focus on work — the admin console gives you one place to easily add or remove members, change team settings, and pay bills. Tiered admin roles let you manage your team more effectively by choosing one of three access levels for admins.

Gain visibility: Keep tabs on how your team’s using Dropbox for Business and what’s being shared. Filter by specific actions and generate activity reports from the admin console.

Simplify provisioning: Dropbox has partnered with trusted identity providers so you can use your existing onboarding and authentication processes.

Better collaboration and productivity

Share with just a click: Forget zipping a large file to send as an email attachment. When you link to the file in Dropbox, clients can view or download the latest version in seconds. You can also create groups to make sharing with the multiple people at the same time even easier.

Give the right people the right access: Dropbox for Business gives you control over permissions to shared folders and links, and lets you restrict members from sharing outside your team. You can also set limits on who can view or edit files within a shared folder, and protect shared links with passwords and expirations.

Simplify your workflow: Quickly find what you need by typing any word contained in a file with full-text search. With the Dropbox badge, see who’s working on a shared Microsoft Office file and more from within the document.

Safeguard company data

Protect files in transit and at rest: Your files are stored using 256-bit AES encryption, and SSL/ TLS creates a secure tunnel for data transfers between you and us.

Protect business data: If a device is lost or someone leaves your team, remotely delete the Dropbox folder to keep your business’s most important data safe. Further protect data with the ability to disable shared links from the admin console.

Put data in its place: Let every employee access both a personal and a work Dropbox, while keeping them separate on all their devices. Get reliable access. Keep your work available with storage designed for 99.999999999% durability.

Manage compliance: Dropbox's data centers, and their managed service providers undergo regular third-party audits. Dropbox's SOC 1, 2, and 3 audit reports are available, as are their ISO 27001 and 27018 certificates. Dropbox is also a member of CSA’s Security, Trust & Assurance Registry (STAR).

Guard user accounts: Put a trusted identity provider in charge of authentication with single sign-on (SSO), and add an additional layer of protection by securing Dropbox accounts with two-step verification.

Maintain privacy: Dropbox's privacy policy is designed to safeguard the collection, use, and disclosure of your business’ information, and they comply with the U.S.–E.U. and U.S.–Swiss Safe Harbor frameworks.

Enterprise solutions: Extend the capabilities of Dropbox for Business and seamlessly integrate your core IT processes with SIEM, DLP, eDiscovery, DRM, data migration, and identity management solutions from industry-leading providers.

With more than a decade of service to the globe's most elite organisations and governments, Entrust helps provide identity-based security with award-winning solutions that defend against sophisticated online and internal threats, increase corporate efficiency and comply with domestic and international regulations.

From security-conscious organisations to innovative government departments, Entrust's identity-based approach helps promote and protect the trust associated with digital identities.

iPass gives access to the world's largest commercial Wi-Fi network, with inflight Internet and far more hotels, airports, and business venues than any other network. Users get easy, reliable connectivity virtually anywhere they roam.

iPass is a global Wi-Fi roaming market leader for enterprise employees and service provider subscribers. iPass knits the world’s commercial Wi-Fi networks together to create a single global Wi-Fi network. With the massive acceleration of the broader Wi-Fi industry, where every mobile phone, tablet and laptop is Wi-Fi enabled, and where Wi-Fi has become the preferred connectivity option for billions of devices, iPass is uniquely positioned to take advantage of the expanding global demand for Wi-Fi services.

Global Wi-Fi for enterprises (Open Mobile Enterprise – OME): iPass serves the connectivity and security needs of enterprise customers and their business travellers. Their value to the enterprise is seamless connectivity, improved productivity and significant cost savings. At the end of 2013, iPass had over 1300 enterprise customers, including 130 of the Fortune 500.

Consumer mobility

Global Wi-Fi for service providers (Open Mobile Exchange – OMX): Started in 2012 with the objective of making global Wi-Fi available on telecommunication carriers’ subscriber bills. This business is in the early stages, but already had 23 carriers signed globally at the end of 2012. Additionally, there are millions of potential end users available through mobile operators, traditional telcos and cable operators, as well as other telecommunication service providers, that can be users of the iPass global Wi-Fi network.

Alongside trend charting and insightful analysis, with IronWorks you can monitor how staff and devices comply with your mobile IT policies. IronWorks is ideal for compliance reporting: its reports can assist you with GDPR, ISO27001 and regulatory framework requirements.

A daily security health check

IronWorks also provides a daily security check. This mini report identifies and warns of expiring certificates, weak encryption protocols, and whether the administration console is accessible from the internet.

It's all too easy to lose or misplace a mobile device. IronWorks provides last known location data via a simple map interface. Now you can recover those missing devices and repurpose your valuable investment.

Save money on licences

Licences can be complex to manage within an organisation and may become inefficient. IronWorks has a proven track record of saving organisations money. IronWorks calculates the most cost-effective licence policy instantly.

Technology case study

This report shows how the ICT teams of four NHS organisations are using MobileIron Enterprise Mobility Management (EMM) solutions to manage mobile device proliferation and demands from employees for greater mobility; and enabling user-driven innovation while maintaining security over their mobile estates.

‘Healthcare On The Move: Four UK NHS Mobility Deployments’

janusNET provides practical, cost effective data security and data loss prevention (DLP) systems that are used throughout government and industry.

janusNET provides practical, cost effective data security and data loss prevention (DLP) systems that are used throughout government and industry.

The solution is based upon a suite of products providing comprehensive classification and protection of files created in Microsoft environments, together with a mobile security capability.

By ensuring that everyone classifies every document or message when created, janusNET provide a functional DLP solution which protects against accidental data loss.

The benefits of classifying email and documents

Classifying information is the simplest and most valuable information security activity that an organisation can undertake. Strangely, and possibly because it is based on traditional (paper) methods, the technique is not as valued as it should be. Classifying emails, or classifying documents - it offers several immediate benefits:

It is easy to do It is a concept that is intrinsically understood It provides meaning and relevance to information It constantly re-affirms the relevance of Information Security and raises security awareness It invokes a simple (but effective) security culture

The janusSEAL products from janusNET ensure that every email and document is classified when created - each one has a "tag" your security systems can recognise.

The janusSEAL products convert your existing systems into functional Data Loss Prevention (DLP) solutions, delivering protection from accidental data loss, the major reason for incidents, at a fraction of the cost of other forms of DLP.

The janusNET solutions represent great value because the above benefits are quickly and easily realised.

Great value and pragmatic mobile security for BYOD

Everybody has a smartphone now and the capacity to access the corporate network, so staff's productivity and working convenience can be improved. You just have to ensure that appropriate information is delivered to the right device. Most email, calendar and contact information is not confidential. In fact, probably 80-90% of email traffic requires no control.

Rather than assume everything is sensitive and the mobile device has to be locked down, janusNET have taken an approach to control just the sensitive material (at most about 5-10%) of communications and allow the rest to flow. This is your solution to the Bring Your Own Device (BYOD) problem. Just secure the sensitive material. If you have deployed BYOD already, and just want to tighten up your controls then janusGATE Mobile, an award winning mobile security solution, should be just what you need.

LogRhythm solutions deliver the insight needed to detect, defend against and respond to the most sophisticated cyber threats.

LogRhythm solutions deliver the insight needed to detect, defend against and respond to the most sophisticated cyber threats. They also help companies efficiently meet compliance requirements and proactively respond to operational challenges. LogRhythm's Security Intelligence Platform uniquely combines next generation SIEM, log management, host forensics and network forensics with advanced analytics to help customers defend against today’s cyber threats.

LogRhythm is an enterprise-class platform that seamlessly combines SIEM, Log Management, File Integrity Monitoring and Machine Analytics, with Host and Network Forensics, in a unified Security Intelligence Platform. It is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment.

LogRhythm delivers:

Next Generation SIEM and Log Management

Independent Host Forensics and File Integrity Monitoring

Network Forensics with Application ID and Full Packet Capture

State-of-the art Machine Analytics

Advanced Correlation and Pattern Recognition

Multi-dimensional User / Host / Network Behaviour Anomaly Detection

Rapid, Intelligent Search

Large data set analysis via visual analytics, pivot, and drill down

Workflow enabled automatic response via LogRhythm's SmartResponse

Integrated Case Management

Logtrust collects, correlates and analyses machine, system and user data in real-time to offer unprecedented capabilities of security intelligence, business and IT monitoring, operation and applications management and compliance.

Logtrust collects, correlates and analyses machine, system and user data in real-time to offer unprecedented capabilities of security intelligence, business and IT monitoring, operation and applications management and compliance.

Security Intelligence - Real-time security monitoring and alerting.

With Logtrust service you’ll be able to manage every aspect of your security. Use the powerful query, correlation and reporting tool, create dashboards to keep you informed in real-time about your most important information, and monitor your systems and users’ activity and more.

Business Monitoring - Global business visibility in Real-Time. You can create and personalise your dashboard to include the most relevant information for your company and/or business and set business alerts (delivered in real-time) to inform you of important events within your business, such as: every time there’s a new sale, each time there’s a new subscriber for your applications, when sales surpass a fixed amount …

IT Monitoring - Gain a holistic view of your systems with Logtrust. The Logtrust system monitoring application provides the real-time status of customers’ infrastructures, analysing a large set of parameters and showing detailed charts with each machine’s historical data.

Behavioural Analytics - Discover the future. The Logtrust Behavioural Analytics engine consists of a set of metrics that allows you to be informed about the habits of your systems, applications and related variables.

Compliance - Meet multiple requirements for collecting, storing and auditing event data. Most IT/security laws, regulations and best practices require data to be held for specific periods of time, the protection, tracking and control of access and usage of sensitive information and the monitoring of logs.

Unique point of view - All your information analysed in a single platform. A single entry point to analyse events from firewalls, systems or webservers, all data generated by your applications, in short, all your machine data…

Troubleshooting - Quickly identify and resolve problems. Logtrust helps you to accelerate troubleshooting across servers and applications. It also allows you to diagnose network issues by searching logs from routers and other devices.

Log Management - Manage a huge volume of data in an easy way. Logtrust Log Management allows you to have a complete visibility across all your infrastructure and business and you will be able to obtain insights, make decisions, improve your security, and always in real-time.

Lookout is a cybersecurity company that predicts and stops mobile attacks before harm is done. Lookout’s cloud-based technology is fuelled by a data set of the world’s mobile code and the predictive machine intelligence to analyse and make sense of the data.

Lookout is a mobile security company that predicts and stops mobile attacks before harm is done to an individual or an enterprise. Lookout’s cloud-based technology is fuelled by a global network of more than 100M mobile sensors and tens of thousands of apps that are added daily. With this data set of the world’s mobile code and the predictive machine intelligence to analyse and make sense of the data, Lookout can identify connections that would otherwise go unseen and stop cybercriminals from attacking mobile devices.

Mimecast is a leader in enterprise cloud services for the security, archiving and management of email and corporate human generated data.

Mimecast is a leader in enterprise cloud services for the security, archiving and management of email and corporate human generated data. UK based data centres ensure UK jurisdiction for email archiving, a must for most organisations.

Office 365 While the capabilities of Office 365 are sufficient for some business, others – particularly in the enterprise space – will need additional third party products and services to address specific requirements not supported by Office 365. These may relate to organisational complexity, risk management considerations, or the simple concern around having so much mission critical technology dependent on a single vendor. Having made the decision to move email to the cloud, CIOs will not want to purchase LAN-based products to meet these requirements. Mimecast provides a rich set of cloud services designed to meet the specific needs of Office 365 customers. We effectively remove barriers to adoption and accelerate deployment, by offering a blended cloud solution that integrates with Office 365.

MobileIron's mission is to enable global companies to become Mobile First organisations, embracing mobility as their primary IT platform in order to transform their businesses and increase their competitiveness.

Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. Mobile First organisations focus on building superb mobile user experiences that are available anywhere users need them. They have to move fast and adopt new technologies rapidly.

Enterprise Mobility Management - EMM

Smartphones and tablets have transformed the way we interact with applications and content in our personal lives and now end users want that experience at work. To meet this growing demand, IT requires an enterprise mobility management solution to provision the apps and content users want, while maintaining privacy and data security.

Enterprise Mobility Management

By providing an enterprise mobility management (EMM) solution that meets both user demands and IT needs, MobileIron is enabling organisations to become truly Mobile First. The MobileIron Platform allows IT to secure and manage devices, apps and content providing end-users with instant access to corporate data on a device of their choice. With this purpose built EMM platform, organisations can spend more time innovating and driving business and less time securing mobile devices.

With MobileIron, organisations can enable the following:

Mobile Device Management - MDM The MobileIron platform enables IT to secure and manage a diverse set of mobile devices, automatically provision enterprise settings such as Wi-Fi and VPN and provide end-users with secure access to corporate email. If a device should fall out of compliance, IT can define remediation actions that will either notify the user of policy violations or selectively wipe corporate information without touching any personal data. The MobileIron Platform consists of MobileIron Core, a security and management policy engine, MobileIron Client that automatically configures the device to function in an enterprise environment, and MobileIron Sentry, an intelligent security gateway.

Mobile Application Management - MAM MobileIron provides an end-to-end solution that provisions, delivers, secures, and retires mobile apps. With these capabilities, IT can manage the entire application life cycle: from making the applications available to employees through the Apps@Work private enterprise app store; to securing applications on the device; containerising corporate apps from personal apps using MobileIron AppConnect.

Mobile Content Management - MCM With MobileIron's integrated solution, IT can enable end-users to securely access and manage enterprise documents residing in a variety of content repositories, including Sharepoint, WebDav, and CIFS. MobileIron’s MCM solution also ensures that corporate email attachments are encrypted and can be viewed using authorised applications including MobileIron Docs@Work. Additionally, end users can securely browse corporate intranet content without the need for a device-wide VPN using MobileIron Web@Work.

NetMotion optimises and secures all traffic to mobile devices across any network, application or operating system which delivers an unparalleled mobile user experience, increases operational efficiencies and resolves performance issues in real time.

NetMotion Mobility is an intelligent solution that not only secures connections and data, but enhances and optimizes network connectivity to ensure business-critical applications are always accessible. It is the component of NetMotion’s Mobile Performance Management solution that accelerates, optimizes and secures all mobile device traffic supporting any network, application or operating system.

NetMotion Diagnostics gives IT teams and business managers the real-time visibility and operational intelligence to productively manage, support and understand their investments in mobile technologies. It allows them to diagnose connectivity-related problems, whether on the mobile device, GPS unit, corporate servers, or across any of the private or public networks being used. It dramatically speeds resolution of issues with remote devices to ensure mobile users stay productive. Diagnostics can also export mobile information and event data to SIEM and BI systems for extending their visibility and value outside the firewall.

Performance Analytics and Diagnostics deliver constant real-time analytics on mobile devices (Windows, iOS, and Android), applications and networks – private and public. The robust data offers a true picture of how workers, devices and applications are using bandwidth, allowing IT to make smarter decisions to tune and enhance the user experience and productivity. And since it is often difficult to tell whether apparent connection problems are caused by the multiple networks (cellular, WiFi, Ethernet, etc.), applications or device hardware, complete troubleshooting information allows IT to respond quickly and get the worker productive again. With the analytics and real-time integration with SIEM and BI analysis tools available (e.g., the NetMotion Mobile Deployment application in Splunkbase), responsible business managers are better equipped for decision making regarding their investments in and operation of mobile technologies.

Want more information on how to optimise your mobility field services?

DownloadNetMotion's e-book on Field Service Mobility Best Practices now.

OneLogin, an innovator in enterprise identity management, provides the industry’s leading SaaS solution for managing internal and external users across all devices and applications.

OneLogin, an innovator in enterprise identity management, provides the industry’s leading SaaS solution for managing internal and external users across all devices and applications.

OneLogin is named Leader in Forrester WaveTM: B2E Cloud IAM, Visionary in Gartner’s IAM as a Service Magic Quadrant and a Major Player in IAM by IDC.

OneLogin’s cloud identity management platform provides more than 2,000 customers with secure single sign-on, multi-factor authentication, integration with common directory infrastructures such as Active Directory and LDAP, user provisioning and more.

Webalo is enterprise mobility made easy. It uses a simple point-and-click, web-based process that anyone can master to connect smartphones and tablets to the enterprise applications and data you already have.

Every enterprise-to-mobile connection can run on any Android, Apple, BlackBerry, or Windows mobile device through a single, secure mobile client, and each connection gives mobile employees the exact data and functions they need to whiz through tasks and workflows more productively.

Create an infinite number of connections, tasks, and workflows and run them through a single, universal client app on smartphones and tablets.

Webalo Advantages for IT Professionals Meeting the demands of every business unit’s mobility requests for access to databases, reports, XML Web services, and websites is an overwhelming burden for IT. Yet Webalo lets you meet each one so quickly and easily that you’ll exceed all expectations for delivery and deployment

Webalo Advantages for Business Users In minutes, Webalo can put interactive, bi-directional, transactional access to IBM, Microsoft, Oracle, SAP, Salesforce.com, and in-house custom-built applications on the smartphone or tablet you already use – securely. Productivity never improved so fast.

Any Data. Any Device. Any Minute. Give employees productivity-enhancing, individualised access to the enterprise data, tasks, and workflows they rely on – the business mobility capabilities that simplify and streamline their work.